lezcepukmale.exe

Secession Schooner Sandier

Reflexions Repasts Reneging

The executable lezcepukmale.exe, “Spittoon Supervene Reassess” has been detected as malware by 23 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘lezcepukmale’. While running, it connects to the Internet address ns22526.ip-91-121-5.eu on port 80 using the HTTP protocol.
Publisher:
Reflexions Repasts Reneging

Product:
Secession Schooner Sandier

Description:
Spittoon Supervene Reassess

Version:
64.67.78.79

MD5:
29bc940ee9a3eac0149ed07dd5753710

SHA-1:
d690b7657235437506fdaf6011c017a82d1bf152

Scanner detections:
23 / 68

Status:
Malware

Analysis date:
4/16/2024 6:15:07 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.1991533
801

AhnLab V3 Security
Trojan/Win32.Cutwail
2014.11.27

Avira AntiVirus
TR/Dldr.Agent.98897
7.11.188.246

AVG
MSIL5
2015.0.3279

Baidu Antivirus
Trojan.Win32.Cutwail
4.0.3.141126

Bitdefender
Trojan.GenericKD.1991533
1.0.20.1650

Dr.Web
BackDoor.Andromeda.559
9.0.1.0330

Emsisoft Anti-Malware
Trojan.GenericKD.1991533
8.14.11.26.10

ESET NOD32
MSIL/Injector.GLU (variant)
8.10784

Fortinet FortiGate
MSIL/GLQ!tr
11/26/2014

F-Secure
Trojan.GenericKD.1991533
11.2014-26-11_4

G Data
Trojan.GenericKD.1991533
14.11.24

IKARUS anti.virus
Trojan.Win32.Cutwail
t3scan.1.8.3.0

Kaspersky
Trojan.Win32.Cutwail
14.0.0.2888

Malwarebytes
Trojan.MSIL.BVXGen
v2014.11.26.10

McAfee
RDN/Spybot.bfr!o
5600.6935

Microsoft Security Essentials
TrojanDownloader:Win32/Cutwail
1.11202

MicroWorld eScan
Trojan.GenericKD.1991533
15.0.0.990

nProtect
Trojan.GenericKD.1991533
14.11.26.01

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Sophos
Troj/MSIL-AZF
4.98

Trend Micro House Call
TROJ_SPNV.01KP14
7.2.330

Trend Micro
TROJ_SPNV.01KP14
10.465.26

File size:
96.6 KB (98,897 bytes)

Product version:
64.67.78.79

Copyright:
Stacks Slaves Remedies

Trademarks:
Proscriptive Pretor Toileting

Original file name:
Slippage.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\documents and settings\shaheen\lezcepukmale.exe

File PE Metadata
Compilation timestamp:
11/24/2014 2:56:00 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:ImjVGv30Mr8wNrrgjNRQBfPNYAKz2cdkUClTTlprfFE:ImO3R4wNrMXQtFYvjyTTbNE

Entry address:
0x1919E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00...
 
[+]

Entropy:
6.8574

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
92.5 KB (94,720 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
lezcepukmale

Command:
C:\documents and settings\shaheen\lezcepukmale.exe


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ns22526.ip-91-121-5.eu  (91.121.5.75:80)

Remove lezcepukmale.exe - Powered by Reason Core Security